CVE-2023-53789
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iommu/amd: Improve page fault error reporting<br />
<br />
If IOMMU domain for device group is not setup properly then we may hit<br />
IOMMU page fault. Current page fault handler assumes that domain is<br />
always setup and it will hit NULL pointer derefence (see below sample log).<br />
<br />
Lets check whether domain is setup or not and log appropriate message.<br />
<br />
Sample log:<br />
----------<br />
amdgpu 0000:00:01.0: amdgpu: SE 1, SH per SE 1, CU per SH 8, active_cu_number 6<br />
BUG: kernel NULL pointer dereference, address: 0000000000000058<br />
#PF: supervisor read access in kernel mode<br />
#PF: error_code(0x0000) - not-present page<br />
PGD 0 P4D 0<br />
Oops: 0000 [#1] PREEMPT SMP NOPTI<br />
CPU: 2 PID: 56 Comm: irq/24-AMD-Vi Not tainted 6.2.0-rc2+ #89<br />
Hardware name: xxx<br />
RIP: 0010:report_iommu_fault+0x11/0x90<br />
[...]<br />
Call Trace:<br />
<br />
amd_iommu_int_thread+0x60c/0x760<br />
? __pfx_irq_thread_fn+0x10/0x10<br />
irq_thread_fn+0x1f/0x60<br />
irq_thread+0xea/0x1a0<br />
? preempt_count_add+0x6a/0xa0<br />
? __pfx_irq_thread_dtor+0x10/0x10<br />
? __pfx_irq_thread+0x10/0x10<br />
kthread+0xe9/0x110<br />
? __pfx_kthread+0x10/0x10<br />
ret_from_fork+0x2c/0x50<br />
<br />
<br />
[joro: Edit commit message]



